2013
DOI: 10.1016/j.sigpro.2012.07.012
|View full text |Cite
|
Sign up to set email alerts
|

Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(31 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…In the following experiments, the embedding schemes with b ¼ 2, 3, and 4 were adopted for comparison. In Al-Qershi and Khoo's scheme [1], the secret bits were first pre-embedded in the one-level DWT coefficients using the difference expansion method, then the standard deviation of each DWT block of the stego image was computed. If the standard deviation was larger than the threshold th, the block was marked as non-embeddable, otherwise, the block was marked as embeddable.…”
Section: Experimental Results and Analysesmentioning
confidence: 99%
See 2 more Smart Citations
“…In the following experiments, the embedding schemes with b ¼ 2, 3, and 4 were adopted for comparison. In Al-Qershi and Khoo's scheme [1], the secret bits were first pre-embedded in the one-level DWT coefficients using the difference expansion method, then the standard deviation of each DWT block of the stego image was computed. If the standard deviation was larger than the threshold th, the block was marked as non-embeddable, otherwise, the block was marked as embeddable.…”
Section: Experimental Results and Analysesmentioning
confidence: 99%
“…By this approach, the quality of the stego image was improved. In the following experiments, the threshold th was 10, as suggested in [1]. The scheme of Qian et al [24] embedded the secret bits in the JPEG bitstream.…”
Section: Experimental Results and Analysesmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, several reversible watermarking methods have been presented. Most existing methods belong to three types: difference expansion [1,2,5,8,10,11,[16][17][18][19][20][21][22][23][24][25][26], histogram-shifting [3,9,12,14,15,27,28], and prediction-based methods [4,13,[29][30][31][32][33][34][35]. Difference expansion was introduced by Tian [2].…”
Section: Introductionmentioning
confidence: 99%
“…In Alattar scheme, he has improved Tian's scheme and was embedded several bits into the difference expansion of adjacent pixels vectors [6]. Al-Qershi et al proposed a two-dimensional difference expansion technique to increase the embedding capacity using a threshold [7].…”
Section: Introductionmentioning
confidence: 99%